Windows Server 2012 Domain Controllers GPO Settings
The following GPO settings assume the Server 2012 Domain has a Domain Functional level and Forest Functional level of a Windows 2012 Server. The procedure below shows how to create a new Group Policy Object.
Click Start and navigate to Administrative Tools > Group Policy Management.
Expand Forest.
Expand Domains.
Expand the Domain in which the Onsite Manager is located.
Right-click Group Policy Objects and select New.
In the Name field, type LPI MW Default Group Policy.
Click OK.
Note: You do not have to create a new Group Policy Object. Editing any current object will have the same effect, providing there are no conflicts between multiple active Group Policy Objects.
Configuring the Workstation and Member Server Firewall
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Network > Network Connections > Windows Firewall > Domain Profile.
Configure the following:
Windows Firewall: Allow local program exceptions
Select Not configuredWindows Firewall: Define inbound program exceptions
Select Not configuredWindows Firewall: Protect all network connections
Select Enabled.Windows Firewall: Do not allow exceptions
Select Not ConfiguredWindows Firewall: Allow inbound file and printer sharing Exception
Select Enabled
In the Allow Unsolicited Incoming Messages From field, enter the local subnet. For greater security, you can specify the IP address of the Onsite Manager server. However, make sure that by introducing this limitation you are not impacting actions of users who are not using Barracuda Managed Workplace.Windows Firewall: Allow ICMP exceptions
Select Enabled
Enable the Allow inbound echo request check box.Windows Firewall: Allow logging
Select Not ConfiguredWindows Firewall: Prohibit notifications
Select Not ConfiguredWindows Firewall: Allow local port exceptions
Select Not ConfiguredWindows Firewall: Define inbound port exceptions
Select Enabled
Click Show. In the Show Contents dialog, type in the following:
5985:TCP:<OM IP Address>:enabled:WinRMWindows Firewall: Allow inbound remote administration exception
Select Enabled
In the Allow Unsolicited Incoming Messages From field, enter the local subnet. For greater security, you can specify the IP address of the Onsite Manager server. However, make sure that by introducing this limitation you are not impacting actions of users who are not using Barracuda Managed Workplace.lWindows Firewall: Allow inbound Remote Desktop exceptions
Select Enabled
In the Allow Unsolicited Incoming Messages From field, enter the local subnet. For greater security, you can specify the IP address of the Onsite Manager server. However, make sure that by introducing this limitation you are not impacting actions of users who are not using Barracuda Managed Workplace.
Caution: The LocalSubnet setting does not allow computers from networks other than the same subnet to connect to all devices to which the GPO is applied. Care should be taken when setting this. If additional networks need to connect to devices, adjust the setting accordingly.Windows Firewall: Prohibit unicast response to multicast or broadcast requests
Select Not ConfiguredWindows Firewall: Allow inbound UPnP framework exceptions
Select Not Configured
Enabling Remote Desktop Services on Clients
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections.
Configure the following:
Allow users to connect remotely by using Remote Desktop Services.Select Enabled
Enabling Remote Assistance on Clients
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > System >Remote Assistance.
Configure the following:
Allow only Windows Vista or later connections
Select DisabledTurn on session logging
Select Not ConfiguredTurn on bandwidth optimization
Select Not ConfiguredCustomize warning messages
Select Not ConfiguredConfigure solicited Remote Assistance
Select Enabled
Choose Allow helpers to remotely control the computer
Set Maximum ticket time (value) to 1
Set maximum ticket time (units) to Hours
Choose Mailto as the Method for sending email invitations
Enabling Remote Event Log Management on Clients
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Windows Settings > Security settings > Windows Firewall with Advanced Security > Inbound Rules.
Right-click Inbound Rules and select New Rule.
Select the Predefined option button, and from the list select Remote Event Log Management.
Click Next.
Ensure that all rules are selected.
Select the Allow the connection option.
Click Finish.
Enabling MBSA Scans
To successfully run MBSA scans, you must enable the Log on as a batch job policy.
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Windows Settings > Security settings >Local Policies> User Rights Assignment.
Configure the following:
Log on as batch job
Check: Define these policy settings
Click Add User or Group
Type the user and group name, and click OK.
Configuring Windows Services for Domain Members
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Windows Settings> Security Settings > System Services.
Configure the following:
Windows Management Instrumentation (WMI)
Check: Define this policy setting
Startup Type: AutomaticRemote Registry
Check: Define this policy setting
Startup Type: AutomaticRemote Procedure Call (RPC)
Check: Define this policy setting
Startup Type: AutomaticBackground Intelligent Transfer Service
Check: Define this policy setting
Startup Type: AutomaticWindows Update
Check: Define this policy setting
Startup Type: Automatic
Only required by Barracuda Managed Workplace if the site uses Patch Management.Windows Remote Management (WS-Management) Properties
Check: Define this policy setting
Select service startup mode: Automatic
Note: When you apply a system service startup policy to Windows XP machine, additional steps may need to be performed so that the service account handling the monitoring can connect to Windows Management Instrumentation. Follow the procedure below to configure the security appropriately.
Open the group policy, go to Computer configuration > Windows Settings > Security Settings > System Services.
Open the property page for Windows Management Instrumentation service from the list.
Click Edit Security.
Add the following permission:
Authenticated Users > Read
Note: When you add Authenticated Users, the default permission box selected will be Start, Stop and Pause which you need to change to only “Read”.Apply the group policy to the Windows XP workstations and restart the affected machines.
Configuring Microsoft Updates for Domain Members
Barracuda Managed Workplace does not use GPO settings to define the update server to managed clients, so any WSUS policies that are in place on the Domain will interfere with normal operations of Patch Management.
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Windows Update
Set all policies to Not Configured.
Enabling Windows Remote Management Settings
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Windows Remote Management (WinRM) > WinRM Service
Configure Allow remote server management through WinRM by doing the following:
Select Enabled.
In the IPv4 filter field, type *.
Navigate to Computer Configuration > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Windows Remote Management (WinRM) > WinRM Client
Configure Trusted Hosts by doing the following:
Select Enabled.
In the TrustedHostsLists field, type *.
Linking GPO to Forest/Domain
Select the Forest to which you want to link the LPI MW Default Group GPO.
From the drop-down menu, select Action.
Click Link an Existing GPO.
Select LPI MW Default Group.
Click OK.
IWindows Server 2008 Domain Controllers GPO Settings
The following GPO settings assume the Windows 2008 Domain has a Domain Functional level and Forest Functional level of a Windows 2008 Server. The procedure below shows how to create a new Group Policy Object.
Click Start and navigate to Administrative Tools > Group Policy Management.
Expand Forest.
Expand Domains.
Expand the Domain in which the Onsite Manager is located.
Right-click Group Policy Objects and select New.
In the Name field, type LPI MW Default Group Policy.
Click OK.
Note: You do not have to create a new Group Policy Object. Editing any current object will have the same effect, providing there are no conflicts between multiple active Group Policy Objects.
Configuring the Workstation and Member Server Firewall
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Network > Network Connections > Windows Firewall > Domain Profile.
Configure the following:
Windows Firewall: Allow local program exceptions
Select Not configuredWindows Firewall: Define inbound program exceptions
Select Not configuredWindows Firewall: Do not allow exceptions
Select Not ConfiguredWindows Firewall: Allow inbound file and printer sharing Exception
Select Enabled
In the Allow Unsolicited Incoming Messages From field, enter the local subnet. For greater security, you can specify the IP address of the Onsite Manager server. However, make sure that by introducing this limitation you are not impacting actions of users who are not using Barracuda Managed Workplace.Windows Firewall: Allow ICMP exceptions
Select Enabled
Enable the Allow inbound echo request check box.Windows Firewall: Allow logging
Select Not ConfiguredWindows Firewall: Prohibit notifications
Select Not ConfiguredWindows Firewall: Allow local port exceptions
Select Not ConfiguredWindows Firewall: Define inbound port exceptions
Select Enabled
Click Show. In the Show Contents dialog, type in the following:
5985:TCP:<OM IP Address>:enabled:WinRMWindows Firewall: Allow inbound remote administration exception
Select Enabled
In the Allow Unsolicited Incoming Messages From field, enter the local subnet. For greater security, you can specify the IP address of the Onsite Manager server. However, make sure that by introducing this limitation you are not impacting actions of users who are not using Barracuda Managed Workplace.Windows Firewall: Allow inbound Remote Desktop exceptions
Select Enabled
In the Allow Unsolicited Incoming Messages From field, enter the local subnet. For greater security, you can specify the IP address of the Onsite Manager server. However, make sure that by introducing this limitation you are not impacting actions of users who are not using Barracuda Managed Workplace.
Caution: The LocalSubnet setting does not allow computers from networks other than the same subnet to connect to all devices to which the GPO is applied. Care should be taken when setting this. If additional networks need to connect to devices, adjust the setting accordingly.Windows Firewall: Prohibit unicast response to multicast or broadcast requests
Select Not ConfiguredWindows Firewall: Allow inbound UPnP framework exceptions
Select Not Configured
Enabling Remote Desktop Services on Clients
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections.
Configure the following:
Allow users to connect remotely by using Remote Desktop Services.
Select Enabled
Note: For Windows Server 2008 R2, this option is called Remote Desktop Services. For Windows Server 2008, this option is called Terminal Services.
Enabling Remote Assistance on Clients
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > System >Remote Assistance.
Configure the following:
Allow only Vista or later connections
Select DisabledTurn on session logging
Select Not ConfiguredTurn on bandwidth optimization
Select Not ConfiguredCustomize Warning Messages
Select Not ConfiguredSolicited Remote Assistance
Select Enabled
Choose Allow helpers to remotely control the computer
Set Maximum ticket time (value) to 1
Set maximum ticket time (units) to Hours
Choose Mailto as the Method for sending e-mail invitationsOffer Remote Assistance
Select Not Configured
Enabling Remote Event Log Management on Clients
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Windows Settings > Security settings > Windows Firewall with Advanced Security > Inbound Rules.
Right-click Inbound Rules and select New Rule.
Select the Predefined option button, and from the list select Remote Event Log Management.
Click Next.
Ensure that all rules are selected.
Select the Allow the connection option.
Click Finish.
Enabling MBSA Scans
To successfully run MBSA scans, you must enable the Log on as a batch job policy.
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Windows Settings > Security settings >Local Policies> User Rights Assignment.
Configure the following:
Log on as batch job
Check: Define these policy settings
Click Add User or Group
Type the user and group name, and click OK.
Configuring Windows Services for Domain Members
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Policies > Windows Settings> Security Settings > System Services.
Configure the following:
Windows Management Instrumentation (WMI)
Check: Define this policy setting
Startup Type: AutomaticRemote Registry
Check: Define this policy setting
Startup Type: AutomaticRemote Procedure Call (RPC)
Check: Define this policy setting
Startup Type: AutomaticBackground Intelligent Transfer Service (BITS)
Check: Define this policy setting
Startup Type: AutomaticWindows Update
Check: Define this policy setting
Startup Type: Automatic
Only required by Barracuda Managed Workplace if the site uses Patch Management.Windows Remote Management (WS-Management) Properties
Check: Define this policy setting
Select service startup mode: Automatic
Note: When you apply a system service startup policy to Windows XP machine, additional steps may need to be performed so that the service account handling the monitoring can connect to Windows Management Instrumentation. Follow the procedure below to configure the security appropriately.
Open the group policy, go to Computer configuration > Windows Settings > Security Settings > System Services.
Open the property page for Windows Management Instrumentation service from the list.
Click Edit Security.
Add the following permission:
Authenticated Users > Read
Note: When you add Authenticated Users, the default permission box selected will be Start, Stop and Pause which you need to change to only “Read”.Apply the group policy to the Windows XP workstations and restart the affected machines.
Configuring Microsoft Updates for Domain Members
Barracuda Managed Workplace does not use GPO settings to define the update server to managed clients, so any WSUS policies that are in place on the Domain will interfere with normal operations of Patch Management.
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Windows Update
Set all policies to Not Configured.
Enabling Windows Remote Management Settings
Right-click LPI MW Default Group and select Edit.
Navigate to Computer Configuration > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Windows Remote Management (WinRM) > WinRM Service
Configure Allow automatic configuration of listeners by doing the following:
Select Enabled.
In the IPv4 filter field, type *.
Navigate to Computer Configuration > Administrative Templates: Policy definitions (ADMX files) retrieved from the local machine > Windows Components > Windows Remote Management (WinRM) > WinRM Client
Configure Trusted Hosts by doing the following:
Select Enabled.
In the TrustedHostsLists field, type *.
Linking GPO to Forest/Domain
Select the Forest to which you want to link the LPI MW Default Group GPO.
From the drop-down menu, select Action.
Click Link an Existing GPO.
Select LPI MW Default Group.
Click OK.
Contact Us
Barracuda Campus
Barracuda Support